As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses) in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the node...
Nowadays malware is a major threat to the security of cyber activities. The rapid development of the...
AbstractLogically centralized nature of the controller in Software-defined Networking (SDN) makes it...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several una...
As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several una...
During COVID-19 the new normal became an increased reliance on remote connectivity, and that fact is...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solut...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is inescapable in systems, and represents a basic risk to network security. Be that as it ma...
In this paper we present analytical techniques that can be used to better understand the behavior of...
A key emerging and popular communication paradigm, primarily employed for information dissem-ination...
Computer viruses are evolving by developing spreading mechanisms based on the use of multiple vector...
University of Minnesota Ph.D. dissertation. September 2016. Major: Computer Science. Advisor: Zhi-Li...
yesPeer-to-Peer (P2P) network is increasingly becoming the most important means of trading content ...
Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabil...
Nowadays malware is a major threat to the security of cyber activities. The rapid development of the...
AbstractLogically centralized nature of the controller in Software-defined Networking (SDN) makes it...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several una...
As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several una...
During COVID-19 the new normal became an increased reliance on remote connectivity, and that fact is...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solut...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is inescapable in systems, and represents a basic risk to network security. Be that as it ma...
In this paper we present analytical techniques that can be used to better understand the behavior of...
A key emerging and popular communication paradigm, primarily employed for information dissem-ination...
Computer viruses are evolving by developing spreading mechanisms based on the use of multiple vector...
University of Minnesota Ph.D. dissertation. September 2016. Major: Computer Science. Advisor: Zhi-Li...
yesPeer-to-Peer (P2P) network is increasingly becoming the most important means of trading content ...
Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabil...
Nowadays malware is a major threat to the security of cyber activities. The rapid development of the...
AbstractLogically centralized nature of the controller in Software-defined Networking (SDN) makes it...
Due to copyright restrictions, the access to the full text of this article is only available via sub...